Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Okta Cross-origin Authentication Feature in Customer Identity Cloud Targeted in Credential Stuffing Attacks

On May 28, 2024, Okta disclosed that the cross-origin authentication feature in Customer Identity Cloud (CIC) is being targeted by credential-stuffing attacks. These attacks involve threat actors using large lists of stolen usernames and passwords to gain unauthorized access to online services. Suspicious activity has been observed starting from April 15, prompting Okta to notify affected customers and provide guidance to mitigate the issue.

"Largest Botnet Ever" Disrupted. 911 S5's Alleged Mastermind Arrested

A vast network of millions of compromised computers, being used to facilitate a wide range of cybercrime, has been disrupted by a multinational law enforcement operation. The 911 S5 botnet, described as "likely the world's largest botnet ever" by FBI Director Christopher Wray, has had its infrastructure and assets seized and its alleged mastermind arrested and charged. 35-year-old YunHe Wang, a dual citizen of China and St.

5 tips for adopting AI code assistance securely

There’s been a lot of excitement around generative AI technology over the past few years, especially in software development. Developers of all levels are turning to AI tools, such as GitHub Copilot, Amazon CodeWhisperer, and OpenAI’s ChatGPT, to support their coding efforts. In fact, GitHub found that 92% of developers use AI coding tools. However, many businesses are realizing that they need to be more cautious when using AI in software development.

These 5 Critical Capabilities Enhance DevSecOps Effectiveness

Implementation of a DevSecOps approach is the most impactful key factor in the total cost of a data breach, according to IBM’s Cost of a Data Breach Report 2023. DevSecOps, security practices integrated in DevOps, represents an advanced practice where the choice of tools is crucial for maximum risk reduction.

DNS, Powered by Intelligence: The Centripetal Advantage

We are trusted by the world’s most iconic brands with protecting their valuable business assets. Being named The Official Cyber Network Provider of The Boston Red Sox and Fenway Park demonstrates the importance for companies to adopt intelligence powered cybersecurity. When you have millions in revenue on the line like the Red Sox, you can’t afford to ignore intelligence.

Best Cybersecurity Practices for Mac Users

Сyberattacks and the threats they pose are becoming more complex every day. Therefore, no user, including Mac users, is immune to viruses, malware, and cyberаttacks. For a long time, Mac computers were thought to be less vulnеrable to such threats than Windows ones. But that does nоt mean they do nоt need reliable protection. After all, as mentioned above, nothing stands still and threats are also improving.

The Beatings Ransoms Will Continue Until Morale Culture Improves

As we near the halfway point of 2024, it is apparent that the epidemic of extortionary cyber attacks will continue unabated into the foreseeable future. Now more than ever, I believe that until organizations adopt cultural approaches to cybersecurity, breaches will continue to wreak havoc on companies and industries. But why is this? There are far too many reasons to enumerate here, but in my experience the biggest factors are.

AI Security Risks and Recommendations: Demystifying the AI Box of Magic

Explore Our Latest Insights on Artificial Intelligence (AI). Learn More. It is easy to assume that large language models (LLMs) and generative AI (GenAI) security products are a mysterious box of magic. While, in general, interactions with these models are abstract; you make an API call to a remote endpoint and receive a response without much exposure to the security controls around the model, there are security risks of AI to consider when using them.